Results 41 to 50 of about 33,844 (282)

Privacy as a Lifestyle: Empowering assistive technologies for people with disabilities, challenges and future directions

open access: yesJournal of King Saud University: Computer and Information Sciences
Between the changing Industry 4.0 landscape and the rise of Industry 5.0, where human intelligence and intelligent machines work together, vast amounts of privacy-sensitive data are generated, processed, and exchanged, making them attractive targets of ...
Adib Habbal   +4 more
doaj   +1 more source

Joining Federated Learning to Blockchain for Digital Forensics in IoT

open access: yesComputers, 2023
In present times, the Internet of Things (IoT) is becoming the new era in technology by including smart devices in every aspect of our lives. Smart devices in IoT environments are increasing and storing large amounts of sensitive data, which attracts a ...
Wejdan Almutairi, Tarek Moulahi
doaj   +1 more source

Adaptive Laplace Mechanism: Differential Privacy Preservation in Deep Learning

open access: yes, 2017
In this paper, we focus on developing a novel mechanism to preserve differential privacy in deep neural networks, such that: (1) The privacy budget consumption is totally independent of the number of training steps; (2) It has the ability to adaptively ...
Dou, Dejing   +3 more
core   +1 more source

Blinatumomab Utilization in Pediatric B‐Cell Acute Lymphoblastic Leukemia: Experience From the Mountain West

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Blinatumomab is a bispecific T‐cell engager approved for the treatment of pediatric B‐cell acute lymphoblastic leukemia (B‐ALL). Outpatient home infusion reduces hospitalization burden and optimizes resource utilization, but is logistically challenging.
Angela Parra del Riego   +10 more
wiley   +1 more source

Privacy-preserving email forensics

open access: yesDigital Investigation, 2015
AbstractIn many digital forensic investigations, email data needs to be analyzed. However, this poses a threat to the privacy of the individual whose emails are being examined and in particular becomes a problem if the investigation clashes with privacy laws.
Armknecht, Frederik, Dewald, Andreas
openaire   +2 more sources

Privacy-Preserving Technologies [PDF]

open access: yes, 2020
AbstractThis chapter introduces privacy and data protection by design, and reviews privacy-enhancing techniques (PETs). Although privacy by design includes both technical and operational measures, the chapter focuses on the technical measures. First, it enumerates design strategies.
Josep Domingo-Ferrer   +1 more
openaire   +1 more source

Discovery and Targeted Proteomic Studies Reveal Striatal Markers Validated for Huntington's Disease

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Clinical trials for Huntington's disease (HD) enrolling persons before clinical motor diagnosis (CMD) lack validated biomarkers. This study aimed to conduct an unbiased discovery analysis and a targeted examination of proteomic biomarkers scrutinized by clinical validation. Methods Cerebrospinal fluid was obtained from PREDICT‐HD and
Daniel Chelsky   +8 more
wiley   +1 more source

RcDT: Privacy Preservation Based on R-Constrained Dummy Trajectory in Mobile Social Networks

open access: yesIEEE Access, 2019
The boom of mobile devices and location-based services (LBSs) greatly enriches the mobile social network (MSN) applications, which bring convenience to our daily life and, meanwhile, raise serious privacy concerns due to the potential disclosure risk of ...
Jinquan Zhang   +3 more
doaj   +1 more source

iPDA: An Integrity-Protecting Private Data Aggregation Scheme for Wireless Sensor Networks [PDF]

open access: yes, 2007
Data aggregation is an efficient mechanism widely used in wireless sensor networks (WSN) to collect statistics about data of interests. However, the shared-medium nature of communication makes the WSNs are vulnerable to eavesdropping and packet tampering/
Abdelzaher, Tarek F.   +4 more
core  

Rate-Privacy in Wireless Sensor Networks

open access: yes, 2013
This paper introduces the concept of rate privacy in the context of wireless sensor networks. Our discussion reveals that the concept indeed is of a great importance for the privacy preservation of such networks.
Derakhshi, H.   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy